Engineering Secure Software and Systems

Engineering Secure Software and Systems
 
Author:
Gilles Barthe, Benjamin Livshits & Riccardo Scandariato
Publisher: Springer
ISBN No: 978-3-642-28166-2
Release at: 2012
Pages: 161
Edition:
First Edition
File Size: 3 MB
File Type: pdf
Language: English



Description of Engineering Secure Software and Systems


It is our pleasure to welcome you to the fourth edition of the International Symposium on Engineering Secure Software and Systems. The main aims of this Engineering Secure Software and Systems book are giving information about security engineering and software engineering, which might help to unite and further develop the two communities in this and future editions. The parallel technical sponsorship from the ACM SIGSAC (the ACM interest group insecurity) and ACM SIGSOFT (the ACM interest group in software engineering) this interdisciplinary research area and its potential clear sign of importance.

Content of Engineering Secure Software and Systems



Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. 1

Guillaume Barbu, Philippe Hoogvorst, and Guillaume Duc

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches (Idea Paper). 14

Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph K ̈uster, and Holger Schmidt

Typed Assembler for a RISC Crypto-Processor (Idea Paper). 22

Peter T. Breuer and Jonathan Bowen

Transversal Policy Conflict Detection. 30

Matteo Maria Casalino, Henrik Plate, and Slim Trabelsi

Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings (Idea Paper). 38

Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr

Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. 46

M ́at ́e Kov ́acs and Helmut Seidl

Formalization and Implementation of the XACML Access Control Mechanism. 60

Massimiliano Masi, Rosario Pugliese, and Francesco Tiezzi

A Task Ordering Approach for Automatic Trust Establishment. 75

Francisco Moyano, Carmen Fernandez-Gago, Isaac Agudo, and Javier Lopez

An Idea of an Independent Validation of Vulnerability Discovery Models (Idea Paper). 89

Viet Hung Nguyen and Fabio Massacci

A Sound Decision Procedure for the Compositionality of Secrecy (Idea Paper). 97

Mart ́ın Ochoa, Jan J ̈urjens, and Daniel Warzecha

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. 106

Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang

Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. 121

Mehrdad Saadatmand, Antonio Cicchetti, and Mikael Sj ̈odin

Hunting Application-Level Logical Errors (Idea Paper). 135

George Stergiopoulos, Bill Tsoumas, and Dimitris Gritzalis

Optimal Trust Mining and Computing on Keyed MapReduce (Idea Paper). 143

Huafei Zhu and Hong Xiao

Author Index. 151

GET THIS BOOK
Similar Books

0 comments: